Fortinet's vision is an intelligent security fabric which spans across the entire network, linking different security sensors and tools together in order to collect, coordinate, and respond to malicious behavior anywhere it occurs in real time. It needs to combine world-class security with dynamic scalability, actionable threat intelligence, automated adaptable response, an ability to interoperate with a rich ecosystem of partners, seamless network segmentation, and an integrated management system that provides single pane of glass visibility and centralized policy creation, distribution, and orchestration.

India Growth Plan 2017

In India, all our three market segments are growing rapidly and present opportunities for further growth. Small and medium enterprises that face the same problems as big corporations, are investing more in comparative solutions that can cover all the aspects of cybersecurity. The service providers in India are investing heavily to provide security for the LTEs or the 4G investment infrastructure. We are also witnessing investments in terms of securing data centers. We will service and grow our key verticals business like government, BFSI, telcos, and ITES with dedicated heads to share the required expertise.

Our focus in 2017 will be on partnering with multi-services conglomerates who integrate large infrastructure projects. Those who provide integrated technology, engineering, construction, manufacturing and project services. The Fortinet Security Fabric will seamlessly integrate their network bringing simplicity and a single pane of management to their complex network environments.

Threat Predictions 2017

FortiGuard Labs threat research team has made six predictions that Fortinet researchers anticipate cyber criminals will employ in the near future.

lFrom smart to smarter: automated and human-like attacks will demand more intelligent defense. Threats are getting smarter and are increasingly able to operate autonomously. In the coming year, we expect to see malware designed "human-like" with adaptive, success-based learning to improve the impact and efficacy of attacks.

lIoT manufacturers will be accountable for security breaches. If IoT manufacturers fail to better secure their devices, the impact on the digital economy could be devastating should consumers begin to hesitate to buy them out of cybersecurity fears. We will see an increase in the call to action from consumers, vendors, and other interest groups for the creation and enforcement of security standards so that device manufacturers are held accountable for their device's behaviors out in the wild.

l20 billion IoT devices are the weakest link for attacking the cloud.The weakest link in cloud security is not in its architecture. It lies in the millions of remote devices accessing cloud resources. We expect to see attacks designed to exploit endpoint devices, resulting in client side attacks that can effectively target and breach cloud providers. Organizations will increasingly adopt fabric-based security and segmentation strategies that enable them to create, orchestrate, and enforce seamless security policies from IoT to the cloud.

lAttackers will begin to turn up the heat in smart cities. As building automation and management systems continue to grow over the next year, they will be targeted by hackers. The potential for massive civil disruption should any of these integrated systems be compromised is severe, and are likely to be a high-value target for cybercriminals.

lRansomware was just the gateway malware.We expect to see very focused attacks against high-profile targets, such as celebrities, political figures, and large organizations. Automated attacks will introduce an economy of scale to ransomware that will allow hackers to cost-effectively extort small amounts of money from large numbers of victims simultaneously, especially by targeting IoT devices.

lTechnology will have to close the gap on the critical cyber skills shortage. The current shortage of skilled cybersecurity professionals means that many organizations or countries looking to participate in the digital economy globally will do so at great risk. They simply do not have the experience or training necessary to develop a security policy, protect critical assets that now move freely between network environments, or identify and respond to today's more sophisticated attacks.